3 serious holes .. How can your phone be a spy tool?



[ad_1]

Allow hackers to spy on phone calls

The information security researchers revealed what they described as the three most dangerous flaws in their history, which could make any smart phone a spy tool.

A specialized study by US researchers has revealed three serious security flaws in 4G and 4G networks that could make any smartphone a spy.

These vulnerabilities allow hackers to spy on phone calls, locate users, or even send fake messages from their phones, said researchers at the University of Bordeaux and Iowa.

The researchers called on telecommunication companies around the world and smart phone manufacturers to put in place a stronger infrastructure for 4G and V networks to address these critical gaps.

The three gaps are:

Torpedo:

This hacker allows a hacker to temporarily interrupt the phone calls for a very short time, during which he can send a phony message to the phone with a call, so that the hackers will can track the location and the phone user.

Piercer:

This more serious gap allows you to intercept the phone number of an IMSI device and fool users by simulating the service signal between users, making it accessible to a hole where any intruder can intercept its calls.

Cracking (IMSI-Carcking):

This vulnerability is the most dangerous of the three previous failures: it allows hackers to know all the information and data of any smartphone user, as well as its complete identity, installed on its fifth generation network.

Hackers can locate their sites, send fake messages instead, make phone calls, send text messages and chat.

3 serious holes .. How can your phone be a spy tool?


previously

The information security researchers revealed what they described as the three most dangerous flaws in their history, which could make any smart phone a spy tool.

A specialized study by US researchers has revealed three serious security flaws in 4G and 4G networks that could make any smartphone a spy.

These vulnerabilities allow hackers to spy on phone calls, locate users, or even send fake messages from their phones, said researchers at the University of Bordeaux and Iowa.

The researchers called on telecommunication companies around the world and smart phone manufacturers to put in place a stronger infrastructure for 4G and V networks to address these critical gaps.

The three gaps are:

Torpedo:

This hacker allows a hacker to temporarily interrupt the phone calls for a very short time, during which he can send a phony message to the phone with a call, so that the hackers will can track the location and the phone user.

Piercer:

This more serious gap allows you to intercept the phone number of an IMSI device and fool users by simulating the service signal between users, making it accessible to a hole where any intruder can intercept its calls.

Cracking (IMSI-Carcking):

This vulnerability is the most dangerous of the three previous failures: it allows hackers to know all the information and data of any smartphone user, as well as its complete identity, installed on its fifth generation network.

Hackers can locate their sites, send fake messages instead, make phone calls, send text messages and chat.

February 27, 2019 – 22 Jumada al-Akhirah 1440

12:14


Allow hackers to spy on phone calls

The information security researchers revealed what they described as the three most dangerous flaws in their history, which could make any smart phone a spy tool.

A specialized study by US researchers revealed three serious security flaws in 4G and 4G networks that could make any smartphone a spy.

These vulnerabilities allow hackers to spy on phone calls, locate users, or even send fake messages from their phones, said researchers at the University of Bordeaux and Iowa.

The researchers called on telecommunication companies around the world and smart phone manufacturers to put in place a stronger infrastructure for 4G and V networks to address these critical gaps.

The three gaps are:

Torpedo:

This hacker allows a hacker to temporarily interrupt the phone calls for a very short time, during which he can send a phony message to the phone with a call, so that the hackers will can track the location and the phone user.

Piercer:

This more serious gap allows you to intercept the phone number of an IMSI device and fool users by simulating the service signal between users, making it accessible to a hole where any intruder can intercept its calls.

Cracking (IMSI-Carcking):

This vulnerability is the most dangerous of the three previous failures: it allows hackers to know all the information and data of any smartphone user, as well as its complete identity, installed on its fifth generation network.

Hackers can locate their sites, send fake messages instead, make phone calls, send text messages and chat.

[ad_2]
Source link